Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

CCS 4204:PROFESSIONAL

ISSUES AND ETHICS IN


ICT
PRIVACY
T

 Add
INTRODUCTION
 Whatsapp privacy issue
Introduction
 Data to share
 Phone numbers, usage data, and information on devices and
operating systems being used
 Goal
 make better friend suggestions and
 display more relevant ads to users
 WhatsApp generate more revenue
Privacy Protection and Law
 Information is stored,analyzed, reported for better decision
making
 to hire a job candidate, approve a loan, or offer a scholarship
 Companies use information to’
 To target marketing efforts to consumers
 To serve them better
Privacy Protection and Law
 Data Gathered
Privacy Protection and Law
 Kenyan Constitution(Chapter 4) guarantees
Privacy Protection and Law
 Systems that gather data on individuals
Privacy Protection and Law
 Systems that gather data on individuals
Information Privacy
 Defn
 Combination of Communication privacy and data privacy
 Is the combination of communications privacy (the ability to
communicate with others without those communications being
monitored by other persons or organizations) and data privacy (the
ability to limit access to one’s personal data by other individuals and
organizations in order to exercise a substantial degree of control
over that data and their use).
Privacy Breaches
 Financial data
 Give out much information to obtain credit from banks
 credit cards, checking and savings accounts, loans, payroll direct
deposit etc
 inadvertent loss or disclosure of these personal financial data carries
a high risk of loss of privacy and potential financial loss.
 Health Information
 Health ACT 2017
Privacy Breaches
 Children’s Personal Data
 Data Protection Act 2019
 Child online Protection
KEY PRIVACY AND ANONYMITY ISSUES
 Include
 consumer profiling,
 electronic discovery,
 workplace monitoring, and
 Advanced surveillance technology.
Consumer Profiling
 Companies openly collect personal information about users
when they register at websites, complete surveys, fill out
forms
 use tracking software to allow their websites to analyze
browsing habits and deduce personal interests and
preferences
 Use cookies to obtain personal information
 tailor the ads and promotions presented to you
Customer Profiling
 If data breach(unintended release of sensitive data or the
access of sensitive data) customer ends up losing
 Leads to identity theft
Customer Profiling
 Identity theft- theft of personal information, which is then used
without the owner’s permission. Often, stolen personal
identification information, such as a person’s name, Social
Security number, or credit card number, is used to commit
fraud or other crimes
 Organizations fear announcing data breaches
Electronic Discovery
 Defn:
 is the collection, preparation, review, and production of electronically
stored information for use in criminal and civil actions and
proceedings.
 Electronically stored information (ESI)
 includes any form of digital information, including emails, drawings,
graphs, web pages, photographs, word-processing files, sound
recordings, and databases stored on any form of magnetic storage
device, including hard drives, CDs, and flash drives.
Workplace Monitoring
 employers monitor workers to ensure that corporate IT usage
policies are being followed.
 80 % of major companies choose to record and review
employee communications and activities on the job, including
phone calls, email, and web surfing
 Issue
 the extent to which employers should be able to monitor the work-
related activities of employees
Case Study
 Add
Advanced Surveillance Technology
 surveillance cameras and satellite-based systems that can
pinpoint a person’s physical location (huduma card)
 diminish individual privacy and complicate the issue of how
much information should be captured
 Can be
 Camera Surveillance-cctv
 Stalking Apps i.e Mobile Spy, ePhoneTracker, FlexiSPY, and Mobile Nanny
END OF LECTURE

You might also like